Cyber Risk Mitigation
Facebook Twitter LinkedIn

Cyber Risk Mitigation

Thursday, May 11, 2023 14:30—18:30
Location: A 03-04

Thursday, May 11th, 2023 - 14:30-18:30

Cyber Risk Mitigation | EIC 2023 (

Cyber risk mitigation refers to the process of identifying, assessing, and reducing risks to the security and integrity of an organization's information systems and data. Developing a security plan and implementing security controls might sound challenging, however organizations must protect their valuable information assets.

Detection and response technologies are designed to help organizations detect and respond to cyber threats in a timely and effective manner. We will navigate the DR (Detection & Response) Jungle: EDR, EPDR, XDR, NDR, MDR, ITDR.

AI can be used to attempt to take over user accounts, also known as account takeover (ATO) attacks. ATO attacks occur when an attacker gains access to a user's account, often by stealing their login credentials, and uses it to conduct fraudulent activities, such as stealing sensitive data or making unauthorized purchases.

Deepfakes, which are realistic videos or audio recordings created using AI and machine learning technologies, pose a significant threat to identity fraud. Deepfakes can be used to impersonate individuals and create convincing fake content that can be used to deceive or manipulate others. Impersonation, Social Engineering, and Malicious Propaganda are just are some ways that deepfakes can be used to facilitate identity fraud.

In a combined session, see and learn “Security by Design”

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website:

You can get 3 CPEs for this track.

After attending this track, you will be able to:

Is ITDR the core, or better identity protection?


Field of Study: Information technology

Prerequisites: None
Advanced Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, go to and book a hybrid event ticket. In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE Credits please fill and send the following form:
After we have checked your attendance you will receive your CPE certificate.

Osman Celik
Osman Celik
Osman joined KuppingerCole as Research Analyst in March 2022. Osman holds a Bachelor of Business Administration degree from Koc University, Turkey, and Master of Management (Track in IT Management)...
Alejandro Leal
Alejandro Leal
Alejandro joined KuppingerCole as a Research Analyst in December 2021. His main areas of expertise include digital transformation in the public and private sector, managing business in...



On-Demand Access
Re-live EIC 2023
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address